Zhao et al., 2016 - Google Patents
Protecting Encryption Keys in Mobile Systems Against Memory ErrorsZhao et al., 2016
View PDF- Document ID
- 8297700037437143994
- Author
- Zhao J
- Kemper P
- Publication year
- Publication venue
- EAI Endorsed Transactions on Security and Safety
External Links
Snippet
Beyond its use to encrypt data, an encryption key can be used as a mean to control access to data on a mobile de-vice by leveraging a cloud service. This implies that a key is present in a mobile device only when it is on demand and authorized by the cloud, the key is evicted …
- 239000007924 injection 0 description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mutlu et al. | Rowhammer: A retrospective | |
Zubair et al. | Anubis: ultra-low overhead and recovery time for secure non-volatile memories | |
US11323242B2 (en) | System, secure processor and method for restoration of a secure persistent memory | |
Jang et al. | SGX-Bomb: Locking down the processor via Rowhammer attack | |
Tang et al. | {CleanOS}: Limiting Mobile Data Exposure with Idle Eviction | |
Gruss et al. | Page cache attacks | |
US20200012600A1 (en) | Computing device with increased resistance against rowhammer attacks | |
CN107949832B (en) | Techniques for executing transactional-only memory | |
CN105339912B (en) | Measure safety zone | |
US11019098B2 (en) | Replay protection for memory based on key refresh | |
US12124595B2 (en) | Detecting unauthorized encryptions in data storage systems | |
Ye et al. | Towards low-cost mechanisms to enable restoration of encrypted non-volatile memories | |
US8458491B1 (en) | Cryptographically scrubbable storage device | |
US9881154B2 (en) | Hardware-assisted log protection devices and systems | |
US8948381B2 (en) | Conditional key generation based on expiration date of data | |
US11714725B2 (en) | System and method for ultra-low overhead and recovery time for secure non-volatile memories | |
Umar et al. | Softvn: Efficient memory protection via software-provided version numbers | |
EP4390708A1 (en) | Selective memory duplication control | |
Zhao et al. | Protecting Encryption Keys in Mobile Systems Against Memory Errors | |
Suganya et al. | Enhancing security for storage services in cloud computing | |
Sha et al. | Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures | |
US11531785B2 (en) | PUF-based data integrity | |
Krishnan et al. | Secure and stateful power transitions in embedded systems | |
Zhang et al. | Building intrusion-tolerant secure software | |
Huang et al. | Update the root of integrity tree in secure non-volatile memory systems with low overhead |